<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 13:43:57 +0000</lastBuildDate>
    <item>
      <title>0da4be07-f62b-43ae-bbfa-abbbf0af0de3</title>
      <link>https://vulnerability.circl.lu/sighting/0da4be07-f62b-43ae-bbfa-abbbf0af0de3/export</link>
      <description>{"uuid": "0da4be07-f62b-43ae-bbfa-abbbf0af0de3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23607", "type": "seen", "source": "https://t.me/cibsecurity/56795", "content": "\u203c CVE-2023-23607 \u203c\n\nerohtar/Dasherr is a dashboard for self-hosted services. In affected versions unrestricted file upload allows any unauthenticated user to execute arbitrary code on the server. The file /www/include/filesave.php allows for any file to uploaded to anywhere. If an attacker uploads a php file they can execute code on the server. This issue has been addressed in version 1.05.00. Users are advised to upgrade. There are no known workarounds for this issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-21T00:22:51.000000Z"}</description>
      <content:encoded>{"uuid": "0da4be07-f62b-43ae-bbfa-abbbf0af0de3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23607", "type": "seen", "source": "https://t.me/cibsecurity/56795", "content": "\u203c CVE-2023-23607 \u203c\n\nerohtar/Dasherr is a dashboard for self-hosted services. In affected versions unrestricted file upload allows any unauthenticated user to execute arbitrary code on the server. The file /www/include/filesave.php allows for any file to uploaded to anywhere. If an attacker uploads a php file they can execute code on the server. This issue has been addressed in version 1.05.00. Users are advised to upgrade. There are no known workarounds for this issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-21T00:22:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0da4be07-f62b-43ae-bbfa-abbbf0af0de3/export</guid>
      <pubDate>Sat, 21 Jan 2023 00:22:51 +0000</pubDate>
    </item>
  </channel>
</rss>
